• Application Of Computer –based Examination System
    [A CASE STUDY OF ABIA STATE POLYTECHNIC, ABA]

  • CHAPTER TWO -- [Total Page(s) 3]

    Page 2 of 3

    Previous   1 2 3    Next
    • There is a self reported cheating of 45% occasional cheater and 33% students who cheats often on the Rutgers campus of 33,500 students. In 1990, only 80 cases of cheating were reported (Fishbein, 1994). In a survey by Micabe and Trevino (1995) a student noted, “it does not pay to be honest in school, because, with certain forms of cheating, the chances of getting caught are slim to none”. (Micabe and Trevino, 1995, P.7). Take home paper examination (Marsh, 1988) found experimentally that there was more cheating by students who took a take home exam than by students who took an in-class exam. However, Weber and McBee (1983) found that there was little difference in the level of cheating between take home, open book and in-class exams. They concluded “finding an answer in a book is probably a more reliable and efficient procedures than having to find the bright person in examination hall, who is a student in class” (Weber and McBee, 1983, P.6).
      Faculty support of academic integrity Micabe (1993) studied the reactions of faculty members cheating as reported by their students faculty at Honor code institutions were reluctant to enforce academic integrity rules, but did so twice as often as did the faculty at non-code schools. 40% of 200 professors surveyed had never turned in a student for cheating 84% seldom turned in a students for cheating and only, 6% chose often. Micabe and Trevino (1995) found that many professor do not wish to be involves with the reporting of cheating violations. Only 50% said that they would not reports even if there were such proof. Faculty said that student are very much aware of which professors will turn them in, and which ones consider it too much red tape. When students thought the class workload was impossible to complete in traditional classes, they would cheat in order to ensure their survival (Alken, 1991, Ashworth and Bannista, 1997, Clayton, 1999, Fishbern, 1993, 1994).
      Administrators at Dallas community college system have found that different courses can be categorized as high or low risk courses for cheating. lowest risk classes for dishonest conduct are those which prepare students to state boards or certificate exams. There is also reduced risk of cheating when the distance classes not in these categories, administrators encourage the use of proctored entrance examination centre (Tulloch and Thompson, 1999).
      In surveying the literature on implementing online instruction not one of the reports recommended unsupervised online school examination. Many distance learning divisions, including those at Tallahassee community college and Northern Virginia community college require students to take at least one proctored exam during the term (Hayes, 1997, Northern Virginia community college, 1998, Serwatka, 1999). Proctored exams are strongly recommended by Gray (1998). She also recommends that photos be collected from students as they register so that the proctor can verify their identity.
      Methods of reducing on-line examination cheating as noted earlier and methods of controlling academic dishonesty fall into two districts categories, honor codes and deterrents. Honor codes and communication about academic integrity are the solutions of choice for a stable group or community whose members know one another well, such as high school, small college, campus or place of employment.
      These methods are not a workable solution for examination someone whom you have never met and may never meet again. The second strategies for reducing on-line examination cheating come from combination of expecting integrity while utilizing deterrents to encourages honesty. Many students are not certain of what constitutes cheating, students need to be told explicitly what constitutes dishonesty behaviour if it is to be deterred (Cizek, 199, Micabe and Trevino, 1993). Carlson (1999) notes that this is important in online examination. He suggests that integrity policy should be noted and posted on the syllable.
      In the article, “maintaining academic integrity in Web based instruction” gray (1998) offers suggestions to instructions of web-based classes. She suggests that when using online type of examination to a URL. The address is E-mailed at a predetermined time along with a deadline for completion. She also suggest integrity quizzes in exercises and reading to make it difficult to get a person unfamiliar with the course specifics to help without demanding a great deal of their time. Biometrics, as a person have begun to utilize the computer for more daily activities, to access is now dependent on a password, which many times is lost or stolen. Biometrics is one of more recent security methods, which is been employed by business, industries, and military to replace password. Biometric techniques includes the measuring of physical attributes or personal traits in order to automatically compare a person’s unique characteristics to date in file. Some of these unique characteristics includes finger prints, voice patterns, faces, hands, irises, retinas or writing methods.
  • CHAPTER TWO -- [Total Page(s) 3]

    Page 2 of 3

    Previous   1 2 3    Next
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTElectronic supported assessment or E-assessment is a field of growing importance. preparing manual test is a difficult task to handle and a time consuming process for teachers, in which they have to prepare both fair and consistent exam for each class. Besides, even is the teacher can prepare a sufficient exam, it is difficult to prevent students from cheating and if teachers cannot prevent them from doing this injustice, it will occur again and again. With this new system, the problem o ... Continue reading---

         

      APPENDIX A - [ Total Page(s): 1 ]APPENDIX 1 FLOWCHART ... Continue reading---

         

      TABLE OF CONTENTS - [ Total Page(s): 1 ]TABLE OF CONTENTSTitle page   Certification    Approval page    Dedication    Acknowledgement   Abstract    Table of contents    CHAPTER ONE1.0.    Introduction    1.1.    Historical Background of case study    1.2.    Objective of the study    1.3.    Importance of study    1.4.    Scope and limitation of study    1.5.    Statement of the problems    1.6.    Organizational structure of case study    1.7.    Definition of terms   ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 5 ]SCHOOL ENGINEERING TECHNOLOGY❖    Civil Engineering Technology❖    Computer Engineering Technology❖    Mechanical Engineering TechnologySCHOOL OF ENVIRONMENTAL DESIGN AND TECHNOLOGY❖    Architecture❖    Building Technology❖    Estate Management❖    Quality Surveying❖    Urban and Regional Planning❖    Surveying and Geo-informaticsSCHOOL OF FOOD SCIENCE AND TECHNOLOGY❖    Food Science and TechnologySCHOOL OF ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 2 ]SECONDARY SOURCES OF DATA COLLECTION: Data from secondary source were collected from extensive use of library material documents released to the course of study. The essence of the secondary source of data collection is to make it possible for the researcher to examine some of the related literature on the system. It is also method used or employed where data obtained indirectly from the original source.EXAMPLES OF PRIMARY SOURCE OF DATA COLLECTIONINTERVIEW METHOD: In view to investigation, offi ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 8 ]CHAPTER FOUR4.0.    SYSTEM ANALYSIS/DESIGNSYSTEM: Is a group of interrelated components working together towards a common goal by accepting input and producing output in an organized transformation process. Basically, there are (3) major components in every system namely inputs, processing and output. In the system the different components are connected to each other.ANALYSIS: Is the process of breaking a complex system into smaller components to gain a better understanding of the system.SYST ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE5.0.    SUMMARYThe computer based examination system has been designed and implemented in this project work. The exercise was carried out based on the loopholes that is in the existing system. Number of problems encountered in the manual system process which are delayed in the release of results, malpractices, cost implication of printing examination materials and human errors. This brings about the need for automation of the examination system. The new system will result in the f ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]REFERENCESConole, G. & Warburton, B. (2005). A review of computer Assisted Assessment, ALT-s, Research in learning Technology, 13(1), 17-31.Dallas, (1999) Science Education (1997).Fluck, A., Pullen O, and Harper, C. (2009) Case study of computer based examination system. Australasian Journal of education technology, 25 (4) 509-523.Frosini, G., Lazzerini B. Marcelloni F., (1989), Performing automatic exams, computers and education , (13(1). P.45-52. Gray, (1998) Maintaining academic integrity in ... Continue reading---